t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
Citations
1,953 citations
Cites background from "t-Closeness: Privacy Beyond k-Anony..."
...Related extensions to k-anonymity include l-diversity, which ensures the sensitive data is represented by a diverse enough set of possible values [15]; and t-closeness, which looks at the distribution of sensitive data [14]....
[...]
1,669 citations
Cites methods from "t-Closeness: Privacy Beyond k-Anony..."
...Machanavajjhala et al. [2006, 2007] modi.ed the bottom-up Incognito [LeFevre et al. 2005] to identify an optimal i-diverse table....
[...]
...The i-Diversity Incognito operates based on the generalization property, similar to Observation 5.2, that i-diversity is nondecreasing with respect to generalization....
[...]
...…[Machanavajjhala et al. 2007]; (a, k)-anonymity [Wong et al. 2006]; (k, e)-anonymity [Zhang et al. 2007]; personalized privacy [Xiao and Tao 2006b]; anatomy [Xiao and Tao 2006a]; tcloseness [Li et al. 2007]; m-invariance [Xiao and Tao 2007]; and (X, Y )-privacy [Wang and Fung 2006]....
[...]
...Although Incognito signi.cantly outperforms the binary search in ef.ciency [Samarati 2001], the complexity of all three algorithms, namely MinGen, binary search, and Incognito, increases exponentially with thesizeof QID....
[...]
...Incognito: Ef.cient full-domain k-anonymity....
[...]
947 citations
801 citations
716 citations
References
8,496 citations
"t-Closeness: Privacy Beyond k-Anony..." refers methods in this paper
...One can calculate EMD using solutions to the transportation problem, such as a min-cost flow[1]; however, these algorithms do not provide an explicit formula....
[...]
7,925 citations
"t-Closeness: Privacy Beyond k-Anony..." refers background or methods in this paper
...Samarati and Sweeney [15, 16, 18] introduced the k-anonymity approach and used generalization and suppression techniques to preserve information truthfulness....
[...]
...To this end, Samarati and Sweeney [15, 16, 18] introduced k-anonymity as the property that each record is indistinguishable with at 1-4244-0803-2/07/$20.00 ©2007 IEEE....
[...]
...To this end, Samarati and Sweeney [15, 16, 18] introduced k-anonymity as the property that each record is indistinguishable with at...
[...]
5,228 citations
"t-Closeness: Privacy Beyond k-Anony..." refers methods in this paper
...And the Kullback-Leibler (KL) distance [8] is defined as:...
[...]
4,593 citations
"t-Closeness: Privacy Beyond k-Anony..." refers background or methods in this paper
...This requirement leads us to the the Earth Mover’s distance (EMD) [14], which is actually a Monge-Kantorovich transportation distance [5] in disguise....
[...]
...Further, in order to incorporate distances between values of sensitive attributes, we use the Earth Mover Distance metric [14] to measure the distance between the two distributions....
[...]